Monero Transaction 2f1063b5e1c971538aab0ac5ba3556bebdd57e3c67c8b879bafa15929947d17d

Autorefresh is OFF

Tx hash: 2f1063b5e1c971538aab0ac5ba3556bebdd57e3c67c8b879bafa15929947d17d

Tx prefix hash: 3a2be277a4c7799f24337705fc95794c743e11f5df2eb6cd90d555c6e2960d6f
Tx public key: c20da07fa79b026af4a7e34a752be4f92607b7bbd1e1b163c82cefa4134009bd
Payment id: 4c65cae22ac1a4bd86115d4716a61cf90b68d8290f36d8788c926af1eca54992

Transaction 2f1063b5e1c971538aab0ac5ba3556bebdd57e3c67c8b879bafa15929947d17d was carried out on the Monero network on 2014-11-26 03:44:37. The transaction has 2981421 confirmations. Total output fee is 0.117664400486 XMR.

Timestamp: 1416973477 Timestamp [UTC]: 2014-11-26 03:44:37 Age [y:d:h:m:s]: 10:021:02:42:48
Block: 321128 Fee (per_kB): 0.117664400486 (0.179833352385) Tx size: 0.6543 kB
Tx version: 1 No of confirmations: 2981421 RingCT/type: no
Extra: 0221004c65cae22ac1a4bd86115d4716a61cf90b68d8290f36d8788c926af1eca5499201c20da07fa79b026af4a7e34a752be4f92607b7bbd1e1b163c82cefa4134009bd

7 output(s) for total of 56.882335599514 xmr

stealth address amount amount idx tag
00: 797d7f334b8e2fe9a1e4e2348a64911ca83f4d52a8fe719cce843329ff0dbd2e 0.082335599514 0 of 1 -
01: a4b1f2a7deb8d26aa195f328fb9d7b6652d181b79efbd87f1d7e773650717cc8 0.300000000000 350285 of 976536 -
02: a78bce79f579f9d0f1edbc4de7db9ed476448672d78e3ea4b1cce4d7996c8fc2 0.500000000000 481959 of 1118624 -
03: 33dda76654649b57e736ed58deaffc8d2d5014519be41a754f4398b88f365871 3.000000000000 155198 of 300495 -
04: 7ca58be2ebbcf37de936ee31fd06ecb38310217a7e2859565d47dc3d36df4253 3.000000000000 155199 of 300495 -
05: 44bc6a17ca25665906828dc0054900ad4ee063748f3aad7c8ec64615ed476ca6 20.000000000000 21781 of 78991 -
06: 58c1aaae769f47e5386dca86c410e1d8b8dfc42dd38482fdf9a4b50d7a93f10e 30.000000000000 11272 of 49201 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-24 10:13:56 till 2014-11-26 04:13:59; resolution: 0.01 days)

  • |______________________________________________________________________________________________________________*___________________________________________________________|
  • |_____________________________________________________________________________________________________________________________________________________________________*____|
  • |_____*____________________________________________________________________________________________________________________________________________________________________|

3 inputs(s) for total of 57.000000000000 xmr

key image 00: 9a2c2614eb57c73e9abf47113aab41dcdc9a6c27133248e3f28cf38c3c982a91 amount: 2.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: aafddfd23c1b8cdb67416718b73bd1b653fa094d6c249f569993415017a4cd22 00320362 1 1/4 2014-11-25 13:28:26 10:021:16:58:59
key image 01: 30c0eea4dc883db5f7638aaf08826944095e5c86c01767d68320b2e590c99d08 amount: 5.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: fac20160975f245e4c1f5d0b4a404e8a18abe43814532abfef142307f1970dbe 00321108 1 2/4 2014-11-26 03:13:59 10:021:03:13:26
key image 02: 2431d73a0b12d944462922c9dfe36951c1bf41df7e0780d1295ce578d16f67e1 amount: 50.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a4df7175043b692c490ea3854bed62f2563b4f57cae081ce17243eee388cb804 00318783 1 10/3 2014-11-24 11:13:56 10:022:19:13:29
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 2000000000000, "key_offsets": [ 134954 ], "k_image": "9a2c2614eb57c73e9abf47113aab41dcdc9a6c27133248e3f28cf38c3c982a91" } }, { "key": { "amount": 5000000000000, "key_offsets": [ 127278 ], "k_image": "30c0eea4dc883db5f7638aaf08826944095e5c86c01767d68320b2e590c99d08" } }, { "key": { "amount": 50000000000000, "key_offsets": [ 8992 ], "k_image": "2431d73a0b12d944462922c9dfe36951c1bf41df7e0780d1295ce578d16f67e1" } } ], "vout": [ { "amount": 82335599514, "target": { "key": "797d7f334b8e2fe9a1e4e2348a64911ca83f4d52a8fe719cce843329ff0dbd2e" } }, { "amount": 300000000000, "target": { "key": "a4b1f2a7deb8d26aa195f328fb9d7b6652d181b79efbd87f1d7e773650717cc8" } }, { "amount": 500000000000, "target": { "key": "a78bce79f579f9d0f1edbc4de7db9ed476448672d78e3ea4b1cce4d7996c8fc2" } }, { "amount": 3000000000000, "target": { "key": "33dda76654649b57e736ed58deaffc8d2d5014519be41a754f4398b88f365871" } }, { "amount": 3000000000000, "target": { "key": "7ca58be2ebbcf37de936ee31fd06ecb38310217a7e2859565d47dc3d36df4253" } }, { "amount": 20000000000000, "target": { "key": "44bc6a17ca25665906828dc0054900ad4ee063748f3aad7c8ec64615ed476ca6" } }, { "amount": 30000000000000, "target": { "key": "58c1aaae769f47e5386dca86c410e1d8b8dfc42dd38482fdf9a4b50d7a93f10e" } } ], "extra": [ 2, 33, 0, 76, 101, 202, 226, 42, 193, 164, 189, 134, 17, 93, 71, 22, 166, 28, 249, 11, 104, 216, 41, 15, 54, 216, 120, 140, 146, 106, 241, 236, 165, 73, 146, 1, 194, 13, 160, 127, 167, 155, 2, 106, 244, 167, 227, 74, 117, 43, 228, 249, 38, 7, 183, 187, 209, 225, 177, 99, 200, 44, 239, 164, 19, 64, 9, 189 ], "signatures": [ "216242a81ff6cb3eaa6c7e7cb22b6806730d149c26d110d3fa701e8507441c055cbe3bac96f1940a98938f211bb141e781e337114587bb754271b5815ddc9e03", "e4af735f3dad6e7f288c4b64bdc27f7316df07bff63774389536e8075f591a055fca30c1ccb0d70e51fbdc719d64051217b10a3609a0e82fc2a52a9d35bee801", "35b5ee7cf5bd2cfebabfeb08b5c1fd53bf1a116125134066433588857f678b0d275d4b0887436144cc88af1f1db3d6b7f0db80c81addea88c8584ed704af5503"] }


Less details
source code | moneroexplorer